Sciweavers

11 search results - page 1 / 3
» sacmat 2005
Sort
View
67
Voted
SACMAT
2005
ACM
15 years 4 months ago
Rule support for role-based access control
Axel Kern, Claudia Walhorn
84
Voted
SACMAT
2005
ACM
15 years 4 months ago
Integrity constraints in trust management
Sandro Etalle, William H. Winsborough
66
Voted
SACMAT
2005
ACM
15 years 4 months ago
GEO-RBAC: a spatially aware RBAC
Elisa Bertino, Barbara Catania, Maria Luisa Damian...
84
Voted
SACMAT
2005
ACM
15 years 4 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
97
Voted
SACMAT
2005
ACM
15 years 4 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens